Confused about SSL/TLS certificates? Here is a quick and dirty introduction to SSL/TLS encryption.
A cybersec showdown of the clouds: cyber security on AWS versus Microsoft Azure
[Updated May 16, 2018] AWS and Microsoft, the two leaders in the race for the best cloud infrastructure, have recognized cyber security as a barrier of adoption. Cyber security professionals are weary of migrating workloads into public cloud environments as it may carry significant risks. Thus, Amazon and Microsoft have developed specialized services to help safeguard users’ cloud infrastructure and data.
This post discusses ways to mitigate cyber threats and launch a cyber defense on AWS and Azure.
How to verify the remaining validity of your letsencrypt certificates
In order to figure out how many days your letsencrypt certificates have left, you could check an online services such as:
https://www.ssllabs.com/ssltest/index.html
However, that won’t work for a mail server that’s not also running a web server using the same certificate.
In this case, your best bet is to check the certificate file directly using the openssl command as follows:
openssl x509 -noout -dates -in /etc/letsencrypt/live/smtp.yourmailserverdomainname.com/cert.pem
How to create OpenSSH keys on a Windows desktop for remote access to a Linux server with PuTTY Key Generator
When using authentication based on keys (as opposed to a password), you have to create the key pair—a private key and a public key—on your local machine, then transfer the public key to the server and install it there. Here is how to do this on a Windows desktop for remote access to a Linux server.
How to set up remote access via SFTP to a web server root directory on RHEL/CentOS/Fedora using key pairs
Your users want to access a web server instance as a staging or production environment for DevOps… They want access to the web server document root of the sites they manage. Your job is to maintain the integrity of the whole system in terms of cyber security.
If you happen to be running a web server on Linux—for example in EC2 on Amazon AWS—and need to provide site owners remote access in a secure and responsible manner, here is how to do it.